Featured Story
ArcaneDoor – New Espionage-Focused Campaign Found Targeting Perimeter Network Devices
ArcaneDoor is the latest example of a state-sponsored espionage campaign targeting perimeter network devices from multiple vendors. These devices, serving as critical gateways into and out of networks, offer high-value entry points for attackers aiming to reroute, intercept, or manipulate traffic. The campaign has reportedly impacted government and critical infrastructure networks globally.
Actors identified as UAT4356 and STORM-1849 exploited critical Cisco ASA vulnerabilities (CVE-2024-20353 and CVE-2024-20359), deploying custom tools “Line Runner” and “Line Dancer” to gain persistence and perform malicious activities without detection.
Other Stories
WARNING: CrushFTP <11.1.0 Vulnerability Allows System File Download
CrushFTP versions below 11.1.0 contain a critical flaw that lets users escape the virtual file system (VFS) and download arbitrary system files. While a DMZ setup offers partial protection, the vulnerability is confirmed to be actively exploited. Patch 11.1.0 mitigates the issue.
Vulnerability Exploitation on the Rise as Attackers Ditch Phishing
Mandiant’s M-Trends 2024 report reveals that attackers are increasingly exploiting vulnerabilities over phishing to gain network access. In 2023, 38% of intrusions started from vulnerability exploitation, while phishing dropped to 17%.
New FPS Economy Website: www.stoparnaques.be
The Belgian FPS Economy has launched www.stoparnaques.be, a centralized platform to help citizens recognize and protect themselves from common online scams. The site includes practical advice, scam examples, and prevention strategies.